Unit 1
Cyber security involves times when data or information is in transit, being processed, and at rest.
Some like to think of cyber security as a subset of information security, a very general term which also deals with information stored physically, in addition to cyber security's pure digital form.
We often fear the unknown hackers from the outside, but insiders are a much greater threat, and can do far greater damage.
A black hat hacker is that cracker, or malicious hacker.
A white hat hacker does what a black hat hacker does, breaking into companies and systems, with their permission, of course, in hopes of finding and exploiting vulnerabilities.
So the company can fix those vulnerabilities before a black hat hacker can get in.
A grey hat hacker is somewhere in the middle. One type of grey hat hacker might break into a system and prove it to the administrator, then the grey hat will request payment to fix it, and if denied,
Which type of hacking does not involve any technology? - Social engineering
Unit 2
A threat is a looming danger that can change or damage your assets.
Threat agents or actors are the ones carrying out the threats. - Ex: Hackers; When threat actors carry out the threat, they exploit the vulnerability.
A vulnerability is a weakness, a flaw in a program, device, network, and even a person.
Hashing
Hashing algorithms have a few characteristics. Variable length input, fixed let output.
You could feed the Declaration of Independence into a hashing algorithm or just your name. In each case you'll wind up with the same sized output hash. Also called a message digest. Hashes are called one-way functions
No comments:
Post a Comment